Term
| Acceptable Use Policy (AUP) |
|
Definition
| A policy that defines the actions users may perform while accessing systems and networking equipment |
|
|
Term
|
Definition
| Cryptography in which a pair of keys is used to encrypt and decrypt a message so that it arrives securely |
|
|
Term
|
Definition
| A public key is used to encrypt a message but only the person that has the private key may be able to decrypt the message |
|
|
Term
|
Definition
| Being the person you claim to be |
|
|
Term
|
Definition
| Security actions that ensure that data is accessible to authorized users |
|
|
Term
|
Definition
| A trust model with one CA that acts as a facilitator to interconnect all other CAs |
|
|
Term
| Certificate authority (CA) |
|
Definition
| A trusted third-party agency that is responsible for issuing digital certificates |
|
|
Term
|
Definition
| A process of documentation that shows that evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A remote site that provides office space; the customer must provide and install all the equipment needed to continue operations |
|
|
Term
|
Definition
| Using technology to search computer evidence of crime |
|
|
Term
|
Definition
| Security actions that ensure only authorized parties can view information |
|
|
Term
|
Definition
| The science of transforming information into a secure form while it is being transmitted or stored so that unauthorized persons cannot access it |
|
|
Term
|
Definition
| The process of changing ciphertext into plaintext |
|
|
Term
|
Definition
| A technology used to associate a user's identity to a public key, in which the user's public key is "digitally signed" by a trusted third party |
|
|
Term
|
Definition
| A mathematical scheme for demonstrating the authenticity of a digital message or document |
|
|
Term
|
Definition
| The procedures and processes for recovering an organization's IT operations fallowing a disaster |
|
|
Term
|
Definition
| A trust model that has multiple CAs that sign a digital certificate |
|
|
Term
| Encrypted File System (EFS) |
|
Definition
| A Windows feature that allows files to be transparently encrypted to protect confidential data from attackers with physical access to the computer |
|
|
Term
|
Definition
| The process of changing plaintext into ciphertext |
|
|
Term
|
Definition
| A metallic enclosure that prevents the entry or escape of an electromagnetic field |
|
|
Term
|
Definition
| The process for creating a unique digital fingerprint signature for a set of data |
|
|
Term
|
Definition
| A trust model that has a single hierarchy with one master CA |
|
|
Term
|
Definition
| A duplicate of the production site that has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link |
|
|
Term
|
Definition
| Security actions that ensure that the information is correct and no unauthorized person or malicious person or software have altered the data |
|
|
Term
|
Definition
| A set of protocols developed to support the secure exchange of packets |
|
|
Term
|
Definition
| A highly trusted person responsible for recovering lost or damaged digital certificates |
|
|
Term
|
Definition
| The process of proving a user performed an action |
|
|
Term
|
Definition
| A test by an outsider to actually to exploit any weaknesses in systems that are vulnerable |
|
|
Term
|
Definition
| A number greater than 1 that has no positive divisors other than 1 and itself |
|
|
Term
|
Definition
| a policy that outlines how the organization uses personal information it collects |
|
|
Term
|
Definition
| An asymmetric encryption key that does have to be protected |
|
|
Term
|
Definition
| An asymmetric encryption key that does not have to be protected |
|
|
Term
| Public Key Infrastructure (PKI) |
|
Definition
| A framework for all the entries involved in digital certificates for digital certificate management |
|
|
Term
| Registration Authority (RA) |
|
Definition
| A subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users |
|
|
Term
|
Definition
| The likelihood that a threat agent will exploit the vulnerability |
|
|
Term
|
Definition
| The assessment of exploits from vulnerabilities |
|
|
Term
|
Definition
| A document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure |
|
|
Term
|
Definition
| A means of gathering information for an attack relying on the weakness of individuals |
|
|
Term
|
Definition
| Grouping individuals and organizations into clusters or groups based on a like affiliation |
|
|
Term
|
Definition
| A UNIX-based command interface and protocol for securely accessing a computer |
|
|
Term
|
Definition
| Hiding the existence of data within a text, audio, image, or video file |
|
|
Term
|
Definition
| Determining in advance who will be authorized to take over in the event of the incapacitation or death of key employees |
|
|
Term
|
Definition
| Encryption that uses a single key to encrypt and decrypt a message |
|
|
Term
|
Definition
| They key used to both encrypt and decrypt a message |
|
|
Term
|
Definition
| A trust model in which two individuals trust each other because each individually trusts a third-party |
|
|
Term
|
Definition
| A type of action that has the potential to cause harm |
|
|
Term
| Trusted Platform Module (TPM) |
|
Definition
| A chip on a motherboard of the computer that provides cryptographic services |
|
|
Term
| Uninterruptible Power Supply |
|
Definition
| An electrical apparatus that provides emergency power to a load when the input power source fails |
|
|
Term
|
Definition
| The process of eavesdropping on the contents of a CRT or LCD display by detecting its electromagnetic emissions |
|
|
Term
|
Definition
| A flaw or weakness that allows a threat agent to bypass security |
|
|
Term
|
Definition
| A remote site that contains computer equipment but does not have active Internet or telecommunication facilities, and does not have backups of data |
|
|